Which of the following is true regarding secure web gateways (SWG)?

Which of the following is true regarding secure web gateways (SWG)?A . SWGs provide protection against malware and advanced threatsB . SWGs are primarily used to secure internal web applications.C . SWGs are no longer necessary with the advent of cloud-based applications.D . SWGs can only be deployed on-premisesView AnswerAnswer:...

March 31, 2025 No Comments READ MORE +

Which of the following services or protocols can be used to ensure the security and compliance of an organization's network?

Which of the following services or protocols can be used to ensure the security and compliance of an organization's network?A . NTP (Network Time Protocol)B . SNMP (Simple Network Management Protocol)C . DHCP (Dynamic Host Configuration Protocol)D . DNS (Domain Name System)View AnswerAnswer: B Explanation: Option 1: NTP is a...

March 31, 2025 No Comments READ MORE +

Which of the following is the most secure and recommended method for storing sensitive user data in a database?

Which of the following is the most secure and recommended method for storing sensitive user data in a database?A . Storing the data in plain textB . Using symmetric encryptionC . Using hashing algorithmsD . Using asymmetric encryptionView AnswerAnswer: C Explanation: Option 1: Incorrect. Storing sensitive user data in plain...

March 29, 2025 No Comments READ MORE +

Which of the following is a common authentication protocol used in wireless networks?

Which of the following is a common authentication protocol used in wireless networks?A . FTPB . WPAC . SSHD . SMTPView AnswerAnswer: B Explanation: WPA (Wi-Fi Protected Access) is a widely used authentication protocol for securing wireless networks. It provides stronger security than the older WEP (Wired Equivalent Privacy) protocol...

March 28, 2025 No Comments READ MORE +

What are botnets?

What are botnets?A . An attack that manipulates individuals into revealing sensitive information or performing certain actions.B . A network of compromised computers controlled by a central entity to carry out malicious activities.C . A form of cyber attack that attempts to gain unauthorized access to a network.D . A...

March 26, 2025 No Comments READ MORE +

Which of the following represents a strong passphrase for securing a wireless SoHo network?

Which of the following represents a strong passphrase for securing a wireless SoHo network?A . 12345678B . P@ssword!C . CorrectHorseBatteryStapleD . jumpr0peView AnswerAnswer: C Explanation: A strong passphrase should be long, include a combination of uppercase and lowercase letters, numbers, and special characters. "CorrectHorseBatteryStaple" represents a strong passphrase as it...

March 24, 2025 No Comments READ MORE +

What is a man-in-the-middle attack?

What is a man-in-the-middle attack?A . An attack that intercepts and manipulates communication between two parties.B . An attack that exploits vulnerabilities in a device's software.C . An attack that targets Internet of Things devices.D . An attack where an insider intentionally releases sensitive information.View AnswerAnswer: A Explanation: A man-in-the-middle...

March 24, 2025 No Comments READ MORE +

What is the main difference between a public and a private network?

What is the main difference between a public and a private network?A . Public networks are secured, while private networks are notB . Private networks are more expensive to set up than public networksC . Public networks use public IP addresses, while private networks use private IP addressesD . Private...

March 23, 2025 No Comments READ MORE +

Which of the following is a characteristic of a network-based firewall?

Which of the following is a characteristic of a network-based firewall?A . Inspects and filters traffic at the application layerB . Operates at the data link layerC . Provides protection against external threats onlyD . Requires software installed on client devicesView AnswerAnswer: C Explanation: Option 1: Incorrect. A network-based firewall...

March 19, 2025 No Comments READ MORE +

Which of the following best describes an Advanced Persistent Threat (APT)?

Which of the following best describes an Advanced Persistent Threat (APT)?A . An unintentional and harmless interaction with a computer systemB . A security incident caused by human error or negligenceC . A targeted cyber attack that aims to gain unauthorized access to sensitive informationD . A type of malware...

March 17, 2025 No Comments READ MORE +